Cybersecurity

United States Defense Contractors and Cybersecurity Challenges

In the United States, a sizable amount of the overall federal budget is allocated to defense spending. The 2018 Defense Budget was signed into...
Ian Carnaghan
7 min read

SSL Labs Rating Woes

I was recently notified that one of the sites I support was getting a ‘C’ rating on SSL Labs. It turned out that there...
Ian Carnaghan
1 min read

Management Actions that Must Happen Prior to a Cyber…

Prior to any cyber attack, an organization should already have a solid crisis management plan and set of disaster recovery precautions in place. In...
Ian Carnaghan
1 min read

Retina-X Hacked: 1 Terabyte Data Erased from the Server

There exist different types of hackers: hacktivists doing hacking for a cause and ethical hacking with good intentions. In April 2017, the systems of...
thetechverse.net
1 min read

Moving Target Defense (MTD)

Organizations continue to struggle with policies and processes to effectively secure their infrastructure to protect their information assets and intellectual property. In recent years,...
Ian Carnaghan
13 min read

TrickBot Malware Targeting Cryptocurrency Exchanges

Malware is increasingly common and dangerous these days. Now, a TrickBot Variant is successfully hacking cryptocurrency exchanges and stealing Bitcoin. TrickBot malware surfaced in...
thetechverse.net
2 min read

Apple Devices Affected By Single Character Bug

The latest bug to hit Apple devices only needs a single character to crash your iPhone and to prevent you accessing your messaging apps...
thetechverse.net
1 min read

Browsealoud Hacked: Used for Monero Mining

Hackers were able to compromise a popular Browsealoud plugin to infect government websites with cryptocurrency mining malware. Cryptocurrency hit headlines in 2018 seeing most...
thetechverse.net
1 min read

The Equifax Breach Was Bigger Than It Seemed

On July 29, Equifax, one of the three largest American credit agencies, revealed that it experienced a large-scale security breach. The credit reporting company...
thetechverse.net
50 sec read

Russian Engineers Caught In Bitcoin Mining Controversy

Russia is home to one of the most powerful computer networks in the world. Local engineers were actually using the supercomputers to try Bitcoin...
thetechverse.net
1 min read

Three Must Have Security Policies In 2018

The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity.  We now see threats from all parts...
Ian Carnaghan
1 min read

Vulnerability Assessments

Vulnerability assessments can be a very effective way of gathering information on an organizations internal security posture. The purpose is to accumulate data on...
Ian Carnaghan
56 sec read